Abstract
Digital certificates provided by PKI are commonly used for identification and authentication services. The corresponding private key can be protected by USB keys, TEE/SE, etc., in the hardware environment. But in the software environment, the private key is relatively easy for an attacker to steal. This paper presents the design and implementation of a collaboration public key services system for mobile applications, which is named MC-PKS. The MC-PKS system provides a set of mobile digital certificate signatures and decryption schemes for PKI in the form of APP-server collaboration. It protects the private key utilizing information hiding and secret splitting on two-party signature schemes, which ensures that the split private key which has been split can still generate a digital signature if and only if with the cooperation of the server. We then analyze the security of the proposed system and show that it satisfies all known security requirements in practical applications. The performance analysis demonstrates that the MC-PKS system also achieves the resource-constrained requirements of mobile applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Buchmann, J.A., Karatsiolis, E., Wiesmaier, A.: Introduction to public key infrastructures (2013)
Rivest, R., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(2), 96–99 (1978)
CNNIC: Public key cryptographic algorithm SM2. https://cnnic.com.cn/ScientificResearch/LeadingEdge/soea/SM2/201312/t20131204_43349.htm. Last Accessed 21 July 2019
Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ecdsa). Int. J. Inf. Secur. 1(1), 36–63 (2001)
Harn, L.: Comments on ‘fair (t, n) threshold secret sharing scheme’. IET Inf. Secur. 8(6), 303–304 (2014)
Harn, L., Fuyou, M.: Multilevel threshold secret sharing based on the chinese remainder theorem. Inf. Process. Lett. 114(9), 504–509 (2014)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Kumar, R., Verma, H. K.: An advanced secure (t, n) threshold proxy signature scheme based on rsa cryptosystem for known signers. In: IEEE 2nd International Advance Computing Conference (IACC). pp. 293–298 (2010)
Muxiang, Y., Fan, H., Minghui, Z., Jun, L.: Efficient and robust two-party rsa key generation. Wuhan Univ. J. Nat. Sci. 11(6), 1617–1620 (2006)
Xiong, H., Li, F., Qin, Z.: Certificateless threshold signature secure in the standard model. Inf. Sci. 237, 73–81 (2013)
Rabin, M.O.: How to exchange secrets with oblivious transfer. IACR Cryptol. ePrint Arch. 2005, 187 (2005)
Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164 (1982)
Wu, L., Wang, J., Choo, K.R., He, D.: Secure key agreement and key protection for mobile device user authentication. IEEE Trans. Inf. Forensics Secur. 14(2), 319–330 (2019)
Ma, C.S., Zheng G.: RSA cloud signature generation method (CN Patent 108923911A 2018)
Merkle, R.C.: Secure communications over insecure channels. Commun. ACM 21(4), 294–299 (1978)
Acknowledgements
This work is supported by the National Natural Science Foundation of China (Nos. 61572028, 61672243), the National Cryptography Development Fund (No. MMJJ20180206), the National Science Foundation of Guangdong Province (No. 2019A1515011797) and the Project of Science and Technology of Guangzhou (201802010044), the State Scholarship Fund of China Scholarship Council (CSC) (Grant No. 201808440097), and the Research Team of Big Data Audit from Guangdong University of Finance and Economics.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sun, T., Chen, S., Huang, J., Wen, Y., Ma, C., Gong, Z. (2021). MC-PKS: A Collaboration Public Key Services System for Mobile Applications. In: Liu, Q., Liu, X., Li, L., Zhou, H., Zhao, HH. (eds) Proceedings of the 9th International Conference on Computer Engineering and Networks . Advances in Intelligent Systems and Computing, vol 1143. Springer, Singapore. https://doi.org/10.1007/978-981-15-3753-0_66
Download citation
DOI: https://doi.org/10.1007/978-981-15-3753-0_66
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3752-3
Online ISBN: 978-981-15-3753-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)